зарубежная компьютерная литература

Hardware-based Computer Security Techniques to Defeat Hackers
5
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat thi…
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat thi…
AutoCAD 2009 and AutoCAD LT 2009 All-in-One Desk Reference For Dummies
4
Nobody ever said AutoCAD was easy, which is why you need AutoCAD & AutoCAD LT 2009 All-In-One Desk Reference for Dummies! These nine minibooks cover all the stuff you need to know to set up AutoCAD for 2D or 3D, create drawings, modify and share them…
Nobody ever said AutoCAD was easy, which is why you need AutoCAD & AutoCAD LT 2009 All-In-One Desk Reference for Dummies! These nine minibooks cover all the stuff you need to know to set up AutoCAD for 2D or 3D, create drawings, modify and share them…
Emerging Technologies for Health and Medicine
5
With the current advances in technology innovation, the field of medicine and healthcare is rapidly expanding and, as a result, many different areas of human health diagnostics, treatment and care are emerging. Wireless technology is getting faster a…
With the current advances in technology innovation, the field of medicine and healthcare is rapidly expanding and, as a result, many different areas of human health diagnostics, treatment and care are emerging. Wireless technology is getting faster a…
Social Media Data Mining and Analytics
3
Harness the power of social media to predict customer behavior and improve sales Social media is the biggest source of Big Data. Because of this, 90% of Fortune 500 companies are investing in Big Data initiatives that will help them predict consumer …
Harness the power of social media to predict customer behavior and improve sales Social media is the biggest source of Big Data. Because of this, 90% of Fortune 500 companies are investing in Big Data initiatives that will help them predict consumer …
Networking All-in-One For Dummies
5
The ultimate reference guide for network administrators Network administrators now have a single, convenient place to turn for all the information they need. Networking All-in-One For Dummies, 4th Edition is like ten books in one, covering such topic…
The ultimate reference guide for network administrators Network administrators now have a single, convenient place to turn for all the information they need. Networking All-in-One For Dummies, 4th Edition is like ten books in one, covering such topic…
Mastering VMware vSphere 6.7
4
Master your virtual environment with the ultimate vSphere guide Mastering VMware vSphere 6.7 is the fully updated edition of the bestselling guide to VMware's virtualization solution. With comprehensive coverage of this industry-leading toolset, this…
Master your virtual environment with the ultimate vSphere guide Mastering VMware vSphere 6.7 is the fully updated edition of the bestselling guide to VMware's virtualization solution. With comprehensive coverage of this industry-leading toolset, this…
HTML5 and CSS3 All-in-One For Dummies
4
A new edition of a bestseller covers the latest advances in web development! HTML5 and CSS3 are essential tools for creating dynamic websites and boast updates and enhanced features that can make your websites even more effective and unique. This fri…
A new edition of a bestseller covers the latest advances in web development! HTML5 and CSS3 are essential tools for creating dynamic websites and boast updates and enhanced features that can make your websites even more effective and unique. This fri…
Too Soon To Tell
5
Based on author David A. Grier's column «In Our Time,» which runs monthly in Computer magazine, Too Soon To Tell presents a collection of essays skillfully written about the computer age, an era that began February 1946. Examining ideas that are both…
Based on author David A. Grier's column «In Our Time,» which runs monthly in Computer magazine, Too Soon To Tell presents a collection of essays skillfully written about the computer age, an era that began February 1946. Examining ideas that are both…
Written into the Grave
4
‘the best book in the series to date’ – Rachel GilbeyCan fiction kill?Vicky Simmons’s life was supposed to be relaxing after she moved back home to the coast of Maine, but instead of baking bread and gardening she’s been chasing down killers and it’s…
‘the best book in the series to date’ – Rachel GilbeyCan fiction kill?Vicky Simmons’s life was supposed to be relaxing after she moved back home to the coast of Maine, but instead of baking bread and gardening she’s been chasing down killers and it’s…
Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability
4
The ability of future industry to create interactive, flexible and always-on connections between design, manufacturing and supply is an ongoing challenge, affecting competitiveness, efficiency and resourcing. The goal of enterprise interoperability (…
The ability of future industry to create interactive, flexible and always-on connections between design, manufacturing and supply is an ongoing challenge, affecting competitiveness, efficiency and resourcing. The goal of enterprise interoperability (…
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
4
The only official study guide for the new CCSP exam CCSP (ISC) 2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC) 2 , this guide he…
The only official study guide for the new CCSP exam CCSP (ISC) 2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC) 2 , this guide he…
SolidWorks 2009 Bible
5
SolidWorks Bible is a comprehensive reference-tutorial that covers the basics, but then quickly ramps up to more advanced level topics. Every feature is thoroughly covered yet written in a way that makes learning this robust program seem non-threaten…
SolidWorks Bible is a comprehensive reference-tutorial that covers the basics, but then quickly ramps up to more advanced level topics. Every feature is thoroughly covered yet written in a way that makes learning this robust program seem non-threaten…
Communicating Embedded Systems
4
The increased complexity of embedded systems coupled with quick design cycles to accommodate faster time-to-market requires increased system design productivity that involves both model-based design and tool-supported methodologies. Formal methods ar…
The increased complexity of embedded systems coupled with quick design cycles to accommodate faster time-to-market requires increased system design productivity that involves both model-based design and tool-supported methodologies. Formal methods ar…
Cybersecurity Essentials
3
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effecti…
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effecti…
About Face
4
The essential interaction design guide, fully revised and updated for the mobile age About Face: The Essentials of Interaction Design, Fourth Edition is the latest update to the book that shaped and evolved the landscape of interaction design. This c…
The essential interaction design guide, fully revised and updated for the mobile age About Face: The Essentials of Interaction Design, Fourth Edition is the latest update to the book that shaped and evolved the landscape of interaction design. This c…
Foundations of Coding
3
Although devoted to constructions of good codes for error control, secrecy or data compression, the emphasis is on the first direction. Introduces a number of important classes of error-detecting and error-correcting codes as well as their decoding m…
Although devoted to constructions of good codes for error control, secrecy or data compression, the emphasis is on the first direction. Introduces a number of important classes of error-detecting and error-correcting codes as well as their decoding m…
Networking Self-Teaching Guide
3
IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find t…
IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find t…
The Art of Rails
3
Ruby on Rails offers the ability to rapidly design and write high-quality code with elegance and maintainability. Written by an experienced web application developer, this book explains how to take good Rails code and turn it into beautiful Rails cod…
Ruby on Rails offers the ability to rapidly design and write high-quality code with elegance and maintainability. Written by an experienced web application developer, this book explains how to take good Rails code and turn it into beautiful Rails cod…
Speech Coding Algorithms
5
Speech coding is a highly mature branch of signal processing deployed in products such as cellular phones, communication devices, and more recently, voice over internet protocol This book collects many of the techniques used in speech coding and pres…
Speech coding is a highly mature branch of signal processing deployed in products such as cellular phones, communication devices, and more recently, voice over internet protocol This book collects many of the techniques used in speech coding and pres…
Emergent Information Technologies and Enabling Policies for Counter-Terrorism
5
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, «connecting the dots» has become the watchword for using information and intelligence to protec…
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, «connecting the dots» has become the watchword for using information and intelligence to protec…

Популярные авторы